2011
DOI: 10.17487/rfc6094
|View full text |Cite
|
Sign up to set email alerts
|

Summary of Cryptographic Authentication Algorithm Implementation Requirements for Routing Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…• IPv6 over Low-Power Wireless Personal Area Networks (6LowPANs) [9] • Routing protocol protection [10] such as Border Gateway Protocol (BGP)/BGP Monitoring Protocol (BMP) [11] and Open Shortest Path First (OSPFv3) [12] VPNs protect communications carried over public networks, such as the internet, as well as private networks, such as fiber networks or Multiprotocol Label Switching (MPLS) networks. A VPN can provide several types of data protection, including confidentiality, integrity, data origin authentication, replay protection, and access control.…”
Section: As Of the Date Of Publication And Following Call(s) For The mentioning
confidence: 99%
See 3 more Smart Citations
“…• IPv6 over Low-Power Wireless Personal Area Networks (6LowPANs) [9] • Routing protocol protection [10] such as Border Gateway Protocol (BGP)/BGP Monitoring Protocol (BMP) [11] and Open Shortest Path First (OSPFv3) [12] VPNs protect communications carried over public networks, such as the internet, as well as private networks, such as fiber networks or Multiprotocol Label Switching (MPLS) networks. A VPN can provide several types of data protection, including confidentiality, integrity, data origin authentication, replay protection, and access control.…”
Section: As Of the Date Of Publication And Following Call(s) For The mentioning
confidence: 99%
“…When an individual's private key is used to digitally sign data, only that same individual's corresponding public key can be used to verify the digital signature. Common algorithms that are used to generate and verify digital signatures include RSA, the Digital Signature Algorithm (DSA) 10 , and the Elliptic Curve Digital Signature Algorithm (ECDSA). NIST-approved digital signature algorithms are specified in FIPS 186 [34] [35].…”
Section: Peer Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…In 183 practice, the terms "IPsec VPN," "IKEv2 VPN," "Cisco IPsec," "IPsec XAUTH," and 184 "L2TP/IPsec" all refer to IPsec-based VPN connections. Some examples of technologies and 185 protocols that use IKE and/or IPsec are: 186 • Ethernet VPN (EVPN) and Virtual eXtensible Local Area Network (VXLAN) [4] • Software-Defined Networking (SDN) and Software-Defined Wide Area Network (SDWAN) • Segment Routing [5] • Data Center Network Virtualization Overlay (NVO3) Networks [6] • Generic Network Virtualization Encapsulation (GENEVE) [7] • Smart Grid [8] • Constrained Application Protocol (CoAP) • Low-Power Wireless Personal Area Network (6LowPAN) [9] • Routing protocol protection [10] such as Border Gateway Protocol (BGP)/BGP Monitoring Protocol (BMP) [11] and Open Shortest Path First (OSPFv3) [12] VPNs protect communications carried over public networks such as the Internet as well as private networks such as fiber networks or Multi-Protocol Label Switching (MPLS) networks. A VPN can provide several types of data protection, including confidentiality, integrity, data origin authentication, replay protection, and access control.…”
Section: Executive Summarymentioning
confidence: 99%